{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:44:42Z","timestamp":1762253082373,"version":"3.43.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/uemcon.2018.8796670","type":"proceedings-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T19:05:06Z","timestamp":1565895906000},"page":"368-374","source":"Crossref","is-referenced-by-count":14,"title":["Building Towards \"Invisible Cloak\": Robust Physical Adversarial Attack on YOLO Object Detector"],"prefix":"10.1109","author":[{"given":"Darren Yu","family":"Yang","sequence":"first","affiliation":[{"name":"Global Innovation Exchange Institute, Tsinghua University"}]},{"given":"Jay","family":"Xiong","sequence":"additional","affiliation":[{"name":"GIX, University of Washangton, Bellevue, WA, U.S."}]},{"given":"Xincheng","family":"Li","sequence":"additional","affiliation":[{"name":"Global Innovation Exchange Institute, Tsinghua University"}]},{"given":"Xu","family":"Yan","sequence":"additional","affiliation":[{"name":"Global Innovation Exchange Institute, Tsinghua University"}]},{"given":"John","family":"Raiti","sequence":"additional","affiliation":[{"name":"Electrical Engineering, University of Washington, Seattle, WA, USA"}]},{"given":"Yuntao","family":"Wang","sequence":"additional","affiliation":[{"name":"Global Innovation Exchange Institute, Tsinghua University"}]},{"given":"HuaQiang","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Microelectronics and Nanoelectronics, Tsinghua University, Beijing, China"}]},{"given":"Zhenyu","family":"Zhong","sequence":"additional","affiliation":[{"name":"X-Lab, Baidu USA, Sunnyvale, CA"}]}],"member":"263","reference":[{"key":"ref10","first-page":"21","volume":"9905","author":"liu","year":"0","journal-title":"Ssd Single shot multibox detector"},{"journal-title":"Practical black-box attacks against machine learning","year":"0","author":"papernot","key":"ref11"},{"journal-title":"The Limitations of Deep Learning in Adversarial Settings","year":"0","author":"papernot","key":"ref12"},{"journal-title":"You only look once Unified real-time object detection","year":"0","author":"redmon","key":"ref13"},{"journal-title":"Faster r-cnn Towards real-time object detection with region proposal networks","year":"0","author":"ren","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"journal-title":"Adversarial generative nets Neural network attacks on state-of-the-art face recognition","year":"0","author":"sharif","key":"ref16"},{"journal-title":"Robust physical-world attacks on deep learning models","year":"0","author":"eykholt","key":"ref4"},{"journal-title":"Robust physical adversarial attack on faster r-CNN object detector","year":"0","author":"chen","key":"ref3"},{"journal-title":"Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation","year":"0","author":"girshick","key":"ref6"},{"journal-title":"Note on Attacking Object Detectors with Adversarial Stickers","year":"0","author":"eykholt","key":"ref5"},{"journal-title":"Adversarial examples in the physical world","year":"0","author":"kurakin","key":"ref8"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"0","author":"goodfellow","key":"ref7"},{"journal-title":"Towards Evaluating the Robustness of Neural Networks","year":"0","author":"carlini","key":"ref2"},{"journal-title":"Synthesizing robust adversarial examples","year":"0","author":"athalye","key":"ref1"},{"journal-title":"Interactive 3d modeling with a generative adversarial network","year":"0","author":"liu","key":"ref9"}],"event":{"name":"2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2018,11,8]]},"location":"New York, NY, USA","end":{"date-parts":[[2018,11,10]]}},"container-title":["2018 9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8784356\/8796511\/08796670.pdf?arnumber=8796670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T17:58:22Z","timestamp":1754503102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8796670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2018.8796670","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}